1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
13

Which type of firewall policy calls for a firewall to deny all traffic by default?

Computers and Technology
1 answer:
charle [14.2K]3 years ago
3 0
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
You might be interested in
Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
brilliants [131]

Answer:

False

Explanation:

The RAM does lose its memory when you turn off the computer, unlike hard drive which is slower but keeps memory

4 0
2 years ago
Read 2 more answers
​When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ co
svetoff [14.1K]

Answer: Stratified sample

Explanation:

For preparing samples of various data of companies and enterprises we need to apply probability distribution to different samples of data. Here in the question we are to apply a representative sample from a list of 200 customers who have complained about errors in their statement. So here we can apply stratified sampling where we can divide the 200 customers into separate groups. These sub groups of the customers are known as stratas. These stratas are selected based on certain characteristics which can be identified among the customers group. Here we can form subgroups based on the type of complain that has been lodged by the customer and selecting 5 customers from four zip codes. Then it would be easy to apply probability distribution to the sub groups to derive information from them.

This process would also enable a more easier and cheaper way of sampling the customer data.

7 0
3 years ago
Why is it important to cite your sources?
emmainna [20.7K]

Answer:

It gives credit to the original author and shows that you are not taking credit for someone

else's work

7 0
3 years ago
Read 2 more answers
From an IT perspective, which of the following best describes BI and BI apps?
Natali5045456 [20]

Answer:a)Stand-alone

Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.

Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).

4 0
2 years ago
Chegg Suppose the heap is a full tree, size 2^n-1. what is the minimum number of steps to change a min heap to a max heap. Show
adoni [48]

Answer:

Explanation:

We start from the bottom-most and rightmost internal node of min Heap and then heapify all internal modes in the bottom-up way to build the Max heap.

To build a heap, the following algorithm is implemented for any input array.

BUILD-HEAP(A)

   heapsize := size(A)

   for i := floor(heapsize/2) downto 1

       do HEAPIFY(A, i)

   end for

Convert the given array of elements into an almost complete binary tree.

Ensure that the tree is a max heap.

Check that every non-leaf node contains a greater or equal value element than its child nodes.

If there exists any node that does not satisfy the ordering property of max heap, swap the elements.

Start checking from a non-leaf node with the highest index (bottom to top and right to left).

4 0
2 years ago
Other questions:
  • A software program that enables users to find and display information stored as html pages on the internet is a(n) ____.
    5·1 answer
  • Who is typically considered to be the father of computing
    6·1 answer
  • Approximately, what percentage of Smartphone owners in America uses their mobile devices to access social media platforms?
    7·1 answer
  • You are asked to optimize a cache design for the given references. Th ere are three direct-mapped cache designs possible, all wi
    7·1 answer
  • Often used in connection with a business
    6·1 answer
  • Implement a recursive program that takes in a number and finds the square of that number through addition. For example if the nu
    5·1 answer
  • All dogs = 199999990158161231
    11·2 answers
  • Discuss how 3D modeling enhances animation.
    13·1 answer
  • Explain what a datalist element does and is used for.
    12·1 answer
  • Aisha designed a web site for her school FBLA club and tested it to see how well it would resize on different systems and device
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!